exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 20376

Secunia Security Advisory 20376
Posted Jun 3, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Firefox, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting and HTTP response smuggling attacks, and potentially compromise a user's system.

tags | advisory, web, vulnerability, xss
SHA-256 | 293c8b931168c6bb569fe1b0f955cc17185d798a8491536b660114eeeca99ff6

Secunia Security Advisory 20376

Change Mirror Download


----------------------------------------------------------------------

Want to join the Secunia Security Team?

Secunia offers a position as a security specialist, where your daily
work involves reverse engineering of software and exploit code,
auditing of source code, and analysis of vulnerability reports.

http://secunia.com/secunia_security_specialist/

----------------------------------------------------------------------

TITLE:
Firefox Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA20376

VERIFY ADVISORY:
http://secunia.com/advisories/20376/

CRITICAL:
Highly critical

IMPACT:
Security Bypass, Cross Site Scripting, System access

WHERE:
>From remote

SOFTWARE:
Mozilla Firefox 1.x
http://secunia.com/product/4227/
Mozilla Firefox 0.x
http://secunia.com/product/3256/

DESCRIPTION:
Multiple vulnerabilities have been reported in Firefox, which can be
exploited by malicious people to bypass certain security
restrictions, conduct cross-site scripting and HTTP response
smuggling attacks, and potentially compromise a user's system.

1) An error in the sandbox protection of JavaScript run via
EvalInSandbox can be exploited to execute arbitrary JavaScript code
with escalated privileges by calling the "valueOf()" function on
external objects outside of the sandbox.

Successful exploitation requires that the attacker is able to execute
JavaScript code inside the EvalInSandbox (e.g. via a Proxy Autoconfig
script or a third-party extension using the vulnerable
functionality).

2) Some errors in the browser engine can be exploited to cause a
memory corruption.

Successful exploitation may allow execution of arbitrary code.

3) Two errors in the handling of specially crafted HTTP responses in
certain situations can be exploited to cause the browser to process a
response as two separate responses from different sites.

Successful exploitation allows execution of arbitrary HTML and script
in a user's browser session in context of an arbitrary site, but
requires that the browser is configured to use a proxy or that the
malicious site shares the same IP address as the targeted site.

4) Two errors in the handling of the "View Image" and "Show only this
frame" functionalities can be exploited to execute arbitrary HTML and
script code in a user's browser session in context of an arbitrary
site by e.g. tricking a user into right-clicking and choosing "View
Image" on a broken image.

5) An error caused due to persisted XUL attributes in certain
situations being associated with an incorrect URL can be exploited to
execute arbitrary JavaScript code with escalated privileges.

6) An error caused due to content-defined setters on an object
prototype being called by privileged code in the user interface can
be exploited to execute arbitrary JavaScript code with escalated
privileges.

7) An error caused due to an off-by-two array boundary error in the
"crypto.signText()" function can be exploited to cause a buffer
overflow by passing optional Certificate Authority name arguments.

8) An error exists due to Unicode Byte-order-Mark (BOM) data being
stripped from documents served in UTF-8 during the conversion to
Unicode. This can be exploited to bypass certain HTML and JavaScript
filtering mechanisms in web applications using the UTF-8 character
encoding.

9) An error in the processing of the addSelectionListener when
handling notifications in certain situations can be exploited to
execute arbitrary JavaScript code with escalated privileges.

SOLUTION:
Update to version 1.5.0.4.
http://www.mozilla.com/firefox/

PROVIDED AND/OR DISCOVERED BY:
1) moz_bug_r_a4
2) Mozilla Developers
3) Kazuho Oku, Cybozu Labs
4) Paul Nickerson
5) Jonas Sicking, Mozilla
6) Paul Nickerson and moz_bug_r_a4
7) Mikolaj J. Habryn
8) Masatoshi Kimura
9) moz_bug_r_a4

ORIGINAL ADVISORY:
1) http://www.mozilla.org/security/announce/2006/mfsa2006-31.html
2) http://www.mozilla.org/security/announce/2006/mfsa2006-32.html
3) http://www.mozilla.org/security/announce/2006/mfsa2006-33.html
4) http://www.mozilla.org/security/announce/2006/mfsa2006-34.html
5) http://www.mozilla.org/security/announce/2006/mfsa2006-35.html
6) http://www.mozilla.org/security/announce/2006/mfsa2006-37.html
7) http://www.mozilla.org/security/announce/2006/mfsa2006-38.html
8) http://www.mozilla.org/security/announce/2006/mfsa2006-42.html
9) http://www.mozilla.org/security/announce/2006/mfsa2006-43.html

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close